Across
- 8. A service that creates a secure connection over the internet.
- 9. The process of addressing and managing the aftermath of a security breach or cyberattack.
- 10. A cryptographic key that can be shared openly and is used for encryption.
- 11. The process of replacing sensitive data with unique identification symbols.
- 13. An incident where unauthorized access to data occurs.
- 14. A network security device that monitors and filters incoming and outgoing traffic.
- 15. A fraudulent attempt to obtain sensitive information by pretending to be a trustworthy entity.
Down
- 1. Best practices and steps to maintain cybersecurity and protect personal information.
- 2. The process of converting encrypted data back into its original form.
- 3. A targeted attempt to steal sensitive information by masquerading as a trusted entity.
- 4. The study of methods to break encryption or analyze cryptographic systems.
- 5. A weakness in a system that can be exploited by attackers.
- 6. Software designed to detect and remove malware from computers.
- 7. A method for restricting access to resources to authorized users only.
- 12. The practice of hiding information within another medium, such as images or text.